124 related articles for article (PubMed ID: 38297629)
1. Optical cryptosystem based on computational ghost imaging and nonlinear authentication.
Zhang L; Wang X; Zhou Q; Xue J; Xu B
Opt Express; 2024 Jan; 32(3):4242-4253. PubMed ID: 38297629
[TBL] [Abstract][Full Text] [Related]
2. Steganographic optical image encryption based on single-pixel imaging and an untrained neural network.
Lin S; Wang X; Zhu A; Xue J; Xu B
Opt Express; 2022 Sep; 30(20):36144-36154. PubMed ID: 36258550
[TBL] [Abstract][Full Text] [Related]
3. Secret sharing scheme based on spread spectrum ghost imaging.
Liu J; Wang L; Zhao S
Appl Opt; 2022 Aug; 61(24):7102-7107. PubMed ID: 36256327
[TBL] [Abstract][Full Text] [Related]
4. Experimental demonstration of ghost-imaging-based authentication in scattering media.
Xiao Y; Zhou L; Chen W
Opt Express; 2019 Jul; 27(15):20558-20566. PubMed ID: 31510147
[TBL] [Abstract][Full Text] [Related]
5. An optical multiple-image authentication based on computational ghost imaging and total-variation minimization.
Zhou Y; Sun Y; Yang M; Hou J; Xiao Z; Anand A; Sui L
Heliyon; 2023 Jul; 9(7):e17682. PubMed ID: 37449136
[TBL] [Abstract][Full Text] [Related]
6. Optical image encryption based on biometric keys and singular value decomposition.
Tao S; Tang C; Shen Y; Lei Z
Appl Opt; 2020 Mar; 59(8):2422-2430. PubMed ID: 32225778
[TBL] [Abstract][Full Text] [Related]
7. Speckle-Based Optical Cryptosystem and its Application for Human Face Recognition via Deep Learning.
Zhao Q; Li H; Yu Z; Woo CM; Zhong T; Cheng S; Zheng Y; Liu H; Tian J; Lai P
Adv Sci (Weinh); 2022 Sep; 9(25):e2202407. PubMed ID: 35748190
[TBL] [Abstract][Full Text] [Related]
8. Optical multiple-image authentication based on computational ghost imaging and hybrid non-convex second-order total variation.
Zhou Y; Sun Y; Yang M; Zhou B; Hou J; Zeng T; Xiao Z; Sui L
Opt Express; 2023 Jun; 31(13):20887-20904. PubMed ID: 37381202
[TBL] [Abstract][Full Text] [Related]
9. Information encryption based on the customized data container under the framework of computational ghost imaging.
Liansheng S; Cong D; Minjie X; Ailing T; Anand A
Opt Express; 2019 Jun; 27(12):16493-16506. PubMed ID: 31252874
[TBL] [Abstract][Full Text] [Related]
10. Computational ghost imaging with spatiotemporal encoding pseudo-random binary patterns.
Ye Z; Liu HC; Xiong J
Opt Express; 2020 Oct; 28(21):31163-31179. PubMed ID: 33115096
[TBL] [Abstract][Full Text] [Related]
11. Optical multiple-image authentication method based on Fourier single-pixel imaging and multiple logistic maps.
Tianyu Z; Liansheng S; Zhaolin X; Yaoling Z
Opt Express; 2023 Jul; 31(16):26535-26551. PubMed ID: 37710512
[TBL] [Abstract][Full Text] [Related]
12. Optical authentication method based on correspondence ghost imaging.
Zhang J; Zhao D; Li Y; Liu Y; Sun M; Li X; Yu Z; Zhou X
Appl Opt; 2023 Oct; 62(29):7678-7688. PubMed ID: 37855475
[TBL] [Abstract][Full Text] [Related]
13. Forgery attack on optical encryption based on computational ghost imaging.
Yuan S; Wang L; Liu X; Zhou X
Opt Lett; 2020 Jul; 45(14):3917-3920. PubMed ID: 32667318
[TBL] [Abstract][Full Text] [Related]
14. Nonlinear Encryption for Multiple Images Based on a Joint Transform Correlator and the Gyrator Transform.
Perez RA; Vilardy JM; Pérez-Cabré E; Millán MS; Torres CO
Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772719
[TBL] [Abstract][Full Text] [Related]
15. Optical information authentication using phase-only patterns with single-pixel optical detection.
Xiao Y; Zhou L; Chen W
Appl Opt; 2021 Apr; 60(10):B1-B7. PubMed ID: 33798130
[TBL] [Abstract][Full Text] [Related]
16. Optical image hiding under framework of computational ghost imaging based on an expansion strategy.
Liansheng S; Jiahao W; Ailing T; Asundi A
Opt Express; 2019 Mar; 27(5):7213-7225. PubMed ID: 30876289
[TBL] [Abstract][Full Text] [Related]
17. Cryptoanalysis and enhancement of a binary image encryption system based on interference.
Du J; Xiong Y; Quan C
Appl Opt; 2021 Sep; 60(26):8038-8045. PubMed ID: 34613065
[TBL] [Abstract][Full Text] [Related]
18. Double Image Encryption System Using a Nonlinear Joint Transform Correlator in the Fourier Domain.
Perez RA; Pérez-Cabré E; Vilardy JM; Millán MS; Torres CO
Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772681
[TBL] [Abstract][Full Text] [Related]
19. Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm.
Liu W; Liu Z; Liu S
Opt Lett; 2013 May; 38(10):1651-3. PubMed ID: 23938899
[TBL] [Abstract][Full Text] [Related]
20. Optical information authentication using compressed double-random-phase-encoded images and quick-response codes.
Wang X; Chen W; Chen X
Opt Express; 2015 Mar; 23(5):6239-53. PubMed ID: 25836845
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]